mica.edu

Website:https://www.mica.edu/
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (50)

1

0 Thumbs up   0 Thumbs down

password


//danube.mica.edu/password_reset/">Forgot your password? MICA: Maryland Institute College of Art About MICA Samuel Hoi, President
Source: mica.edu

2

0 Thumbs up   0 Thumbs down

Attack


Intentional act of attempting to bypass one or more computer security controls.
Source: mica.edu

3

0 Thumbs up   0 Thumbs down

authenticate


To verify the identity of a user, user device, or other entity, or the integrity of data stored, transmitted, or otherwise exposed to unauthorized modification in an information system, or to establish the validity of a transmission.
Source: mica.edu

4

0 Thumbs up   0 Thumbs down

Authentication


Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information.
Source: mica.edu

5

0 Thumbs up   0 Thumbs down

Back door


Hidden software or hardware mechanism used to circumvent security controls. Synonymous with trap door.
Source: mica.edu

6

0 Thumbs up   0 Thumbs down

Countermeasures


Action, device, procedure, technique or other measure that reduces the vulnerability of an information system.
Source: mica.edu

7

0 Thumbs up   0 Thumbs down

Data Driven Attack


A form of attack that is encoded in seemingly innocuous data which is executed by a user or a process to implement an attack. A data driven attack is a concern for firewalls, since it may get through the firewall in data form and launch an attack against a system behind the firewall.
Source: mica.edu

8

0 Thumbs up   0 Thumbs down

denial of service


Result of any action or series of actions that prevents any part of an information system from functioning.
Source: mica.edu

9

0 Thumbs up   0 Thumbs down

Dictionary Attack


An attack that uses a brute-force technique of successively trying all the words in some large, exhaustive list.
Source: mica.edu

10

0 Thumbs up   0 Thumbs down

DNS spoofing


Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain.
Source: mica.edu


To view all 50 definitions, please sign in.